Cyber attacks carried out by nation-states and cybercrime rings often get the headlines, but insider threats can be far more costly and damaging. A recent cyber security study points to insiders as the most costly source of attack at an average of nearly $145,000 each and taking nearly 54 days to resolve, the longest of any type of attack.

The risks insiders pose to organizations in all industries are very real, but many are failing to deal with the issue. A recent survey on insider threats revealed that while 74 percent of respondents are concerned about them, nearly half have no idea what they’re spending to address them, and 32 percent admitted they have no ability whatsoever to prevent an insider attack.

In addition to best practices such as robust personnel background checks, security awareness programs and policy strategies for social media and BYOD, there are key tactics and strategies your organization can use to address insider threats.

Join us to learn:
• The types of insiders behind these threats.
• How to determine if your organization is doing enough to address them.
• Five key elements to building an effective insider threat strategy.
• How to move beyond IT and treat these threats as an operational issue that crosses people, process and technology.

Company

Securonix Security Analytics Platform, Securonix UEBA, Securonix Cloud, Securonix Security Data Lake,
and Securonix Security Applications are trademarks and of Securonix, Inc. in the United States and
other countries. All other brand names, product names, or trademarks belong to their respective
owners. 2019 Securonix, Inc. All rights reserved.